Secure Multi-Function Computation with Private Remote Sources

06/17/2021
by   Onur Günlü, et al.
0

We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through public communication. The distributed function computation is subject to constraints, including not only reliability and storage but also privacy and secrecy. Specifically, 1) the remote source should remain private from an eavesdropper and the fusion center, measured in terms of the information leaked about the remote source; 2) the function computed should remain secret from the eavesdropper, measured in terms of the information leaked about the arguments of the function, to ensure secrecy regardless of the exact function used. We derive the exact rate regions for lossless and lossy single-function computation and illustrate the lossy single-function computation rate region for an information bottleneck example, in which the optimal auxiliary random variables are characterized for binary-input symmetric-output channels. We extend the approach to lossless and lossy asynchronous multiple-function computations with joint secrecy and privacy constraints, in which case inner and outer bounds for the rate regions differing only in the Markov chain conditions imposed are characterized.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/11/2022

Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints

The problem of reliable function computation is extended by imposing pri...
research
05/10/2022

Secure and Private Source Coding with Private Key and Decoder Side Information

The problem of secure source coding with multiple terminals is extended ...
research
01/28/2022

Function Computation Without Secure Links: Information and Leakage Rates

Consider L users, who each holds private data, and one fusion center who...
research
09/07/2020

Multiple Private Key Generation for Continuous Memoryless Sources with A Helper

We propose a method to study the secrecy constraints in key generation p...
research
05/17/2020

Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise

A basic model for key agreement with a remote (or hidden) source is exte...
research
12/08/2017

A Classification of Functions in Multiterminal Distributed Computing

In the distributed function computation problem, dichotomy theorems, ini...
research
08/30/2018

Decentralized Detection with Robust Information Privacy Protection

We consider a decentralized detection network whose aim is to infer a pu...

Please sign up or login with your details

Forgot password? Click here to reset